Recon
sudo apt install golang chromium-driver
go get github.com/michenriksen/aquatone
export PATH="$PATH":"$HOME/go/bin"
// aquatone to get screenshots
cat facebook_aquatone.txt | aquatone -out ./aquatone -screenshot-timeout 1000
// zone transfer
nslookup -type=any -query=AXFR zonetransfer.me nsztm1.digi.ninja
//discovering Virtual Hosts using ffuf
ffuf -w ./vhosts -u http://192.168.10.10 -H "HOST: FUZZ.randomtarget.com" -fs 612
//solving
curl -i -s http://10.129.88.154 -H "HOST: dmz.inlanefreight.htb"
// content-length
ffuf -w /opt/useful/SecLists/Discovery/DNS/namelist.txt -u http://10.129.88.154 -H "HOST: FUZZ.inlanefreight.htb" -fs 102
// crawl to find hidden
ffuf -recursion -recursion-depth 1 -u http://192.168.10.10/FUZZ -w /opt/useful/SecLists/Discovery/Web-Content/raft-small-directories-lowercase.txt
// cewl to extract words
cewl -m5 --lowercase -w wordlist.txt http://192.168.10.10
// ffuf with extensions
ffuf -w ./folders.txt:FOLDERS,./wordlist.txt:WORDLIST,./extensions.txt:EXTENSIONS -u http://192.168.10.10/FOLDERS/WORDLISTEXTENSIONS
// all subdomains
export TARGET="githubapp.com"
curl -s "https://crt.sh/?q=${TARGET}&output=json" | jq -r '.[] | "\(.name_value)\n\(.common_name)"' | sort -u > "${TARGET}_crt.sh.txt"
// JS obfuscator
https://obfuscator.io/
https://jsconsole.com/
// js deobfuscate
http://www.jsnice.org/
//decode HEX
echo 68747470733a2f2f7777772e6861636b746865626f782e65752f0a | xxd -p -r
//rot13
ot13, http://www becomes uggc://jjj
// rot13 decode
echo uggcf://jjj.unpxgurobk.rh/ | tr 'A-Za-z' 'N-ZA-Mn-za-m'
//tool
https://rot13.com/
// cypher identifier
https://www.boxentriq.com/code-breaking/cipher-identifier
// decode hex
echo "4150495f70336e5f37333537316e365f31355f66756e" | xxd -r -p && echo ''
Last updated
Was this helpful?